Introduction to Linux Part 2A: Additional Items and Editors

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Linux Part 2A: Additional Items and Editors Introduction to Linux Part 2a: additional items and editors Anita Orendt and Wim Cardoen Center for High Performance Computing More on Environment • Environment variable – variable with a name and associated value; used in shells, scripts • Use env or printenv command to see environment variables • Some important variables • $USER • $PATH – paths to search for commands • $LD_LIBRARY_PATH – paths to search for libraries when linking a program (more on that later) More about Processes • Process := Running Linux program Each process has a PID (Process ID) ps :: Report snapshot of the current processes ps [options] ps x Display ALL the processes to `whoami` ps ax Display ALL processes ps aux Display ALL processes (more detailed) ps auxw Display ALL processes (more detailed & unlimited width) ps -eFwww Killing processes • kill PID • killall processname • kill -9 PID Other Job Controls • Ctrl+C (^C) terminate the currently running process • Ctrl-Z (^Z) suspends the currently running process • & runs the job in the background • Jobs: lists all jobs, with their number • bg %n: puts current or specified job (%n) in the background and • fg %n: bring suspended program back to the foreground, e.g., so that it occupies the shell until done Monitoring processes/usage • uptime • free • top • atop • htop • sar Moving files to/from CHPC • Windows – there are graphical tools such as WinSCP • Mac, Windows, cloud options – cyberduck another graphical tool • Linux • scp command (secure shell copy) – to copy files between linux systems • wget – to download from web with URL • curl • For larger data sets – look into the Data Transfer Nodes (DTNs) and transfer tools such asglobus https://www.chpc.utah.edu/documentation/data_services.php Editors There are many choices – a few are • Nano • Vi • Emacs Nano editor • Start with command nano Vi editor ❑ Editor provided with the OS ❑ There are other choices such as nano (easy) and emacs (hard) ❑ It is better to edit in a linux shell than moving file to your laptop for editing ❑ To start – command is vi (usage: vi filename) ❑ If filename exists, vi will open it up in the editor ❑ If filename does not exist, vi will create it and put you in insert mode ❑ Use arrow keys to move cursor to location ❑ Two modes – command, input ❑ in command mode – the characters typed are interpreted as commands ❑ There is also an external command mode – access with ‘:’ ❑ In insert mode – the characters typed are added to the file ❑ The esc key exists the insert mode ❑ Many commands, we are just mentioning some basic ones to get you started Exiting the vi editor ❑ ZZ – will exit and save as same filename ❑:q – quit; will let you know if you have unsaved changes ❑:q! - quit discarding changes ❑:wq – write and quit; same as doing :w followed by :q ❑saves as same filename ❑ To change name add new name after the :w or :wq ❑ Note – if you cntl Z to suspend – vi saves a swap filename to save current status of the edits. File is named .filename.swp. Next time you try to edit this same file it will let you know the swp file exists and asks you how to proceed. If you do not want to keep changes, delete this file Moving around a file ❑ down arrow or j moves down one line ❑ up arrow or k moves up one line ❑ right arrow or l moves right by one character ❑ left arrow or h moves left by one character ❑ 0 or ^ moves to start of current line ❑ $ moves to end of current line ❑ w moves to beginning of next word ❑ b moves to beginning of previous word ❑ :0 or :1 or 1G moves to start of first line ❑ :n or nG moves to start of nth line ❑ :$ or G moves to start of last line ❑ cntl-f (^f) moves forward one screen (cntl-d moves forward ½ screen) ❑ cntrl-b (^b) moves back one screen (cntrl-u moves back ½ screen) Inserting or Adding Text ❑ Remember – esc to exit to command mode ❑ i – insert at position of cursor ❑ I – insert at beginning of line ❑ a – append after position of cursor ❑ A – append at end of line ❑ o – new line below current line ❑ O – new line above current line Changing and Deleting Text ❑ r – replace single character ❑ R – replace characters, starting at cursor position, until esc hit ❑ x – delete character that cursor is on (nx for n characters starting with one cursor is on) ❑ dd – delete current line (can do n lines with ndd) ❑ D – delete from cursor to end of line ❑ dw – delete word Cutting and Pasting Text ❑ Y – “yanks” current line into buffer (can use nY for n lines, current plus following lines) ❑ p – paste lines in buffer after current line ( P – paste lines before current line) Other Useful Commands ❑ /pattern – searches for next occurrence of pattern, then n goes to next occurrence; can also use / and ? To move to previous and next occurrence ❑?pattern – searches for previous occurrence of pattern ❑ u – to undo results of last command (use multiple times to revert back through multiple commands External commands ❑ already mentioned some of these in the moving around and exiting vi ❑ :s/old_text/new_text/ – replaces next occurrence of old_text in current line ❑ :1,$s/old_text/new_text/g – replaces all occurrences of old_text in file Exercise – Practice these commands! • Try the “vimtutor” command • Try writing some source code (C, python, fortran, etc) • Try writing your grocery list.
Recommended publications
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • K15569543: Producing a TMM Diagnostic Core File
    K15569543: Producing a TMM diagnostic core file Support Solution Original Publication Date: Oct 22, 2019 Update Date: Aug 12, 2020 Details Description F5 Support may ask you to produce a Traffic Management Microkernel (TMM) core file on the BIG-IP system to establish the state of TMM process during an event. You should perform this task only when asked to do so by F5 Support. Important: The BIG-IP system will temporarily fail to process traffic as it recovers from TMM restarting, and devices configured as a high availability (HA) pair may fail over. Additionally, on platforms with a large memory capacity, the system will respond slowly while it writes several gigabytes of data to the disk and compresses the core file. This process may take several minutes to complete. When the core file compression is complete, the unit returns to normal operation and restarts the TMMs. Environment BIG-IP F5 Support has requested a TMM diagnostic core file Adequate amount of disk space for the diagnostic core file K14403: Maintaining disk space on the BIG-IP system Cause None Recommended Actions To produce a TMM diagnostic core file, perform the following: 1. Disable the watchdog process K13539: Disabling the watchdog process to perform a core dump (11.x - 15.x) 2. Log in to the BIG-IP command line 3. Determine which tmm processes are running on the system, enter the following command: ps ax | grep -i tmm Note: Most BIG-IP platforms are enabled with Clustered Multiprocessing (CMP) and run multiple TMM 3. instances. Example: If a system has two instances of tmm running, output appears similar to the following: 5736 ? S 0:00 runsv tmm 12325 ? S 0:00 /usr/bin/tmipsecd --tmmcount 12 12327 ? S 0:00 /etc/bigstart/scripts/tmm.start /var/run 12 6 0 0 --platform E101 -m -s 21853 16379 ? SLl 17:22 tmm.0 -T 6 --tmid 0 --npus 12 --platform E101 -m -s 21853 16380 ? SLl 17:31 tmm.6 -T 6 --tmid 6 --npus 12 --platform E101 -m -s 21853 17707 pts/0 S+ 0:00 grep -i tmm Note: In this example, the two tmm instances are tmm.0 and tmm.6 4.
    [Show full text]
  • Pingdirectory Administration Guide Version
    Release 7.3.0.3 Server Administration Guide PingDirectory | Contents | ii Contents PingDirectory™ Product Documentation................................................ 20 Overview of the Server............................................................................. 20 Server Features.................................................................................................................................20 Administration Framework.................................................................................................................21 Server Tools Location....................................................................................................................... 22 Preparing Your Environment....................................................................22 Before You Begin.............................................................................................................................. 22 System requirements..............................................................................................................22 Installing Java......................................................................................................................... 23 Preparing the Operating System (Linux).......................................................................................... 24 Configuring the File Descriptor Limits.................................................................................... 24 File System Tuning.................................................................................................................25
    [Show full text]
  • Unix (And Linux)
    AWK....................................................................................................................................4 BC .....................................................................................................................................11 CHGRP .............................................................................................................................16 CHMOD.............................................................................................................................19 CHOWN ............................................................................................................................26 CP .....................................................................................................................................29 CRON................................................................................................................................34 CSH...................................................................................................................................36 CUT...................................................................................................................................71 DATE ................................................................................................................................75 DF .....................................................................................................................................79 DIFF ..................................................................................................................................84
    [Show full text]
  • Docker Windows Task Scheduler
    Docker Windows Task Scheduler Genealogical Scarface glissading, his karyotype outgone inflicts overflowingly. Rudolph is accessorial and suckers languorously as sociologistic Engelbart bridled sonorously and systematises sigmoidally. Which Cecil merchandises so unbelievably that Cole comedowns her suavity? Simple task runner that runs pending tasks in Redis when Docker container. With Docker Content Trust, see will soon. Windows Tip Run applications in extra background using Task. Cronicle is a multi-server task scheduler and runner with a web based front-end UI It handles both scheduled repeating and on-demand jobs targeting any. Django project that you would only fetch of windows task directory and how we may seem. Docker schedulers and docker compose utility program by learning service on a scheduled time, operators and manage your already interact with. You get a byte array elements followed by the target system privileges, manage such data that? Machine learning service Creatio Academy. JSON list containing all my the jobs. As you note have noticed, development, thank deity for this magazine article. Docker-crontab A docker job scheduler aka crontab for. Careful with your terminology. Sometimes you and docker schedulers for task failed job gets silently redirected to get our task. Here you do want to docker swarm, task scheduler or scheduled background tasks in that. Url into this script in one easy to this was already existing cluster created, it retry a little effort. Works pretty stark deviation from your code is followed by searching for a process so how to be executed automatically set. Now docker for windows service container in most amateur players play to pass as.
    [Show full text]
  • Linux Cheat Sheet
    1 of 4 ########################################### # 1.1. File Commands. # Name: Bash CheatSheet # # # # A little overlook of the Bash basics # ls # lists your files # # ls -l # lists your files in 'long format' # Usage: A Helpful Guide # ls -a # lists all files, including hidden files # # ln -s <filename> <link> # creates symbolic link to file # Author: J. Le Coupanec # touch <filename> # creates or updates your file # Date: 2014/11/04 # cat > <filename> # places standard input into file # Edited: 2015/8/18 – Michael Stobb # more <filename> # shows the first part of a file (q to quit) ########################################### head <filename> # outputs the first 10 lines of file tail <filename> # outputs the last 10 lines of file (-f too) # 0. Shortcuts. emacs <filename> # lets you create and edit a file mv <filename1> <filename2> # moves a file cp <filename1> <filename2> # copies a file CTRL+A # move to beginning of line rm <filename> # removes a file CTRL+B # moves backward one character diff <filename1> <filename2> # compares files, and shows where differ CTRL+C # halts the current command wc <filename> # tells you how many lines, words there are CTRL+D # deletes one character backward or logs out of current session chmod -options <filename> # lets you change the permissions on files CTRL+E # moves to end of line gzip <filename> # compresses files CTRL+F # moves forward one character gunzip <filename> # uncompresses files compressed by gzip CTRL+G # aborts the current editing command and ring the terminal bell gzcat <filename> #
    [Show full text]
  • Catalyst 9500 Switches)
    System Management Configuration Guide, Cisco IOS XE Gibraltar 16.12.x (Catalyst 9500 Switches) First Published: 2019-07-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • Gist of Test Program 1 Socket Class and Its Client Class This Class Hasn't
    Gist of test program 1 Socket class and its client class This class hasn't been changed except that an overloaded method send has been added. This send method use a very flexible way to send contents with a customised size, two arguments are passed, I.e. a pointer pointing to the start of the block of memory, and a integer typed size. Within this block of memory to be sent, users can send any types of data with a specified size. This is the way to make a socket send method more flexible, and more important thing is to make it type independent. Based on the same spirit, a recv method has been overloaded, with only one argument. This recv method is to receive the block of data contained in a specified memory and customised size. So the pointer will be pointing the start of the block of memory that it receives. So before sending a block of data in the memory, users should know how to package the data block. Similarly, after receiving a block of data, users should know how to decode that block of data by its types and size respectively, as shown in the figure below. Data type 1 Data type 2 Pointer pointing to start Data type ... Drawing 1: package a block of data 2 ClientSocketN class In this class, the LogSend and LogRecv methods are overloaded in order to cope with the client interface for send and recv methods described above. Again, the same type of arguments are adjusted. 3 odr.h In this header file, the ODR packet contains many things as described as follows.
    [Show full text]
  • Managing User Accounts and User Environments in Oracle® Solaris 11.3
    Managing User Accounts and User ® Environments in Oracle Solaris 11.3 Part No: E54800 March 2017 Managing User Accounts and User Environments in Oracle Solaris 11.3 Part No: E54800 Copyright © 1998, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]